Lab 3
docx
keyboard_arrow_up
School
Victoria University *
*We aren’t endorsed by this school
Course
NIT2141
Subject
Information Systems
Date
Apr 3, 2024
Type
docx
Pages
3
Uploaded by shivnag
Lab 3
Write a report by doing your own research to answer the following questions:
1-
In a drug case, you suspect there has been communication between two suspected ringleaders, as both know about the delivery and pickup. The lawful interception has not seen any direct communication between these suspects: no SMS, calls, or direct data streams. You suspect they have used their smartphones to communicate. a)
What do you think you can find on their phones? If there's suspicion of communication between two suspects in a drug case, despite the absence of direct communication via calls, SMS, or data streams intercepted through lawful means, there are still several avenues to explore on their smartphones:
Messaging Apps
Cloud Storage
Location History
Internet Browser History
Photos and Videos
Third Party Apps
It's important to note that accessing this information may require appropriate legal authorization, such as a warrant, and should be conducted in agreement with applicable laws and regulations.
b)
How would you start looking for their communication? When facing with the challenge of investigating suspected communication between two individuals in a drug case, despite the lack of direct evidence from lawful interception, there are several steps to start looking for their communication on their smartphones:
Digital Forensic Analysis
Network Analysis
Application Analysis
Deleted Data Recovery
Collaboration with Tech Experts
Interviews
Surveillance and Monitoring
By analytically exploring these paths and employing a combination of technical analysis, forensic techniques, and investigative strategies, law enforcement agencies can effectively uncover evidence of communication between suspected ringleaders in a drug case.
c)
Anything you can do before the suspects are brought in? Before bringing the suspects in for questioning or further investigation, there are several steps you can take to gather preliminary evidence and build a case:
Surveillance
Data Analysis
Witness Interviews
Search Warrants
Informant Cooperation
By taking these proactive steps before bringing the suspects in, law enforcement agencies can gather additional evidence, identify potential communication methods, and strengthen the case against the suspected ringleaders in the drug operation.
d)
How would you acquire the data from the phones? Acquiring data from the smartphones of suspected ringleaders in a drug case can be a complicated process, requiring law and guidelines. Here's how you might proceed to gain access to the data:
Obtain Legal Authorization
Secure the Devices
Use Forensic Tools
Cloud Data Extraction
Backup Extraction
Analyze the Data
By following these steps and following law and guidelines, law enforcement agencies can gain access to the data from the smartphones of suspected ringleaders in a drug case to gather evidence and build a stronger case.
e)
And how would you search for traces?
If there is direct communication between the suspected ringleaders in a drug case hasn't been detected through lawful capture methods such as SMS, calls, or direct data streams, but there is a suspicion that they've used their smartphones to communicate, there are several methods to search for traces of communication:
App Usage Analysis
Deleted Data Recovery
Network Traffic Analysis
Digital Footprint Analysis
Location Tracking
Content Hiding Techniques
Informant Help
By analytically exploring these paths and employing a combination of technical analysis, forensic techniques, and investigative strategies, law enforcement agencies can search for traces of communication between suspected ringleaders in a drug case.
2-
The handling of evidence is an important consideration. The crime scene investigator has found a phone on the scene of crime, and suspects that there is crucial evidence in the phone. The phone seems to have some droplets inside the cracked screen. He hands you the
phone and says that due to the importance of the digital evidence, you should acquire the data first, and then the other forensic experts will look for fingerprints and biological traces after you are finished. A)
How should you handle the device? Handling the device properly is crucial to maintain the integrity of the digital evidence. Here's how I would handle the device in this scenario:
Secure the Device
Secure Storage
Prevent Further Damage
Acquire Data First
Use Forensic Tools
Coordinate with Other Experts
By following these steps and handling the device with care, you can acquire the digital evidence from the phone while maintaining its integrity for following forensic analysis by other experts.
B)
What should you do to minimize the health hazards? To minimize health hazards associated with handling the phone with drop inside the cracked
screen, follow these precautions:
Personal Protective Equipment (PPE)
Isolation
Hand Hygiene
Proper Disposal
Communication
By following these precautions, you can minimize health hazards while acquiring digital evidence from the phone with droplets inside the cracked screen, ensuring the safety of both yourself and others involved in the investigation.
C)
And how to minimize the impact you leave on the other traces?
To minimize the impact on other traces, such as fingerprints and biological material, while gaining digital evidence from the phone, follow these precautions:
Minimize Handling
Use Clean Tools
Document Before and After
Handle with Care
Isolate the Device
Organize with Other Experts
Clean Workspace
By following these precautions, you can minimize the impact on other traces while gaining digital evidence from the phone, ensuring the integrity of all evidence collected during the investigation.
3-
What should we consider before picking up an electronic device at the scene of crime?
Before picking up an electronic device at the scene of a crime, several factors should be considered to ensure the integrity of the evidence and the safety of investigators:
Safety Precautions
Power Status
Securing the Device
Potential Data Encryption
External Storage Media
Talk with Experts
By considering these factors before picking up an electronic device at the scene of a crime, investigators can ensure the integrity of the evidence and maximize the potential for obtaining valuable information for the investigation.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help